Java Games: Flashcards, matching, concentration, and word search.

1 Viruses and Destructive Programs Flashcards

AB
AdwareSoftware designed to embed advertisements into applications being used
Boot Sector VirusInfects the system files that your computer uses every time it is turned on
Computer VirusA computer program written to alter the way a computer operates
Dictionary AttackDestructive program designed to discover personal/computer passwords
File VirusType of virus that inserts a destructive code into executable files
How viruses are spreadEmail, websites, networks, phishing, hackers, messaging, mobile devices, family and friends
Logic BombProgrammed to initiate on a specific date or when specific events occur
Macro VirusInfects documents and causes a sequence of events to perform automatically when the application is started
MalwareShort for malicious software. Example: Trojan Horse
Memory Resident VirusResides in the RAM and are initiated from viruses which run on computers and then hide in memory
PasswordsMix letters, numbers and symbols; upper and lower case letters
Phishing & SpoofingActions taken through email to falsely gather personal information about the user
Protect your computer with . . .Anti-virus software, avoid rogue websites, don't open suspicious attachments
Social EngineeringThe act of obtaining or attempting to obtain secure data by conning individuals into revealing personal information
SpywareSoftware that gathers user information through the user's Internet connection without his knowledge
Trojan HorseA computer program that seems to perform one function while actually doing something else
Types of virusesTrojan Horse, Worm, Macro, Memory Resident, Boot Sector, Logic Bomb
Viruses can . . .corrupt files; destroy data, display messages, corrupt systems
War DrivingAct of driving around with a laptop or other mobiel device in order to use unauthorized wireless services for hacking or other unethical purposes
WormProgram designed to enter a computer system, usually through a network, through security holes and then replicate itself

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities